{"updated":"2025-01-19T10:07:31.007586+00:00","links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233350","sets":["1164:2836:11471:11524"]},"path":["11524"],"owner":"44499","recid":"233350","title":["脆弱なPLWEインスタンスを用いたMP-LWE問題の安全性解析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-11"},"_buckets":{"deposit":"8d64407f-5ca2-4ab8-9813-00210a0c6bfd"},"_deposit":{"id":"233350","pid":{"type":"depid","value":"233350","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"脆弱なPLWEインスタンスを用いたMP-LWE問題の安全性解析","author_link":["633630","633632","633631"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"脆弱なPLWEインスタンスを用いたMP-LWE問題の安全性解析"},{"subitem_title":"Security Analysis of MP-LWE Problem using Vulnerable PLWE Instances","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号2","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-11","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学"},{"subitem_text_value":"大阪大学"},{"subitem_text_value":"大阪大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Osaka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233350/files/IPSJ-DPS24198066.pdf","label":"IPSJ-DPS24198066.pdf"},"date":[{"dateType":"Available","dateValue":"2026-03-11"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS24198066.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"14782ab2-eaa8-49be-8f84-0fd9564de80e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田川, 雄大"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥村, 伸也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮地, 充子"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2017 年,Rosca らによって LWE 問題の新たな変種である Middle-Product LWE(MP-LWE)問題が提案された.MP-LWE 問題は Polynomial LWE(PLWE)問題の安全性が特定の多項式に依存するというセキュリティ上のリスクを軽減することができる.MP-LWE 問題の攻撃手法として,Kannan の埋め込み法や Primal Attack が提案されている.これらの攻撃手法は格子簡約アルゴリズムを用いるため,次元の増加に伴い実行時間が指数関数的に増加する.一方,PLWE 問題に対しては実行時間の次元に対する依存度が低い攻撃手法が Elias らによって提案されている.本研究では Elias らによる手法を用いた MP-LWE 問題への攻撃を提案する.実験の結果,Elias らによる手法を適用できるケースで攻撃が成功することが確認された.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In 2017, Rosca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new variant of the LWE problem. The MP-LWE problem mitigates the security risk of the Polynomial LWE (PLWE) problem in that its security depends on a particular polynomial. As attack methods for the MP-LWE problem, Kannan's embedding method and the Primal Attack have been proposed. These methods use a lattice reduction algorithm. Therefore, the execution time increases exponentially with the increase in dimension. Elias et al. have proposed an attack method for the PLWE problem where the execution time is less dependent on the dimension. In this study, we propose an attack on the MP-LWE problem using Elias et al.'s method. Experimental results showed the success of the attack in cases where Elias et al.'s method can be applied.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"66","bibliographicVolumeNumber":"2024-DPS-198"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":233350,"created":"2025-01-19T01:34:44.370359+00:00"}